Questions tagged with Security
The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events.
Content language: English
Filter questions
Select tags to filter
Sort by
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
1372 results
How can I design a secure architecture for a public-facing API on AWS when the application interacts with multiple backend services (databases, event-driven components, and external APIs) while ensuri...
Accepted AnswerSecurity
1
answers
0
votes
26
views
asked 4 days ago
What’s the recommended way to test whether my Bedrock application is resistant to prompt injection and jailbreaks before going to production?
1
answers
0
votes
22
views
asked 4 days ago
I am trying Inspector Code Security
Connected a GitHub repo with several projects. Those projects show up in the Code Security repository list.
I selected each and clicked on 'On-demand Scan'. A mess...
Accepted AnswerSecurity
3
answers
0
votes
21
views
asked 6 days ago
Greetings all,
When working on complex network ACL, we sometimes have to enter IP Addresses - Looking back at the network ACL months later, I can't figure out who owns the IP Address what what is it...
1
answers
1
votes
36
views
asked 7 days ago
Hi All,
I have just started to learn VPC on AWS. I have a scenario where I launched two private and one public subnets. My expectation is that private instances should connect to internet via NAT gat...
1
answers
0
votes
34
views
asked 7 days ago
Hello everyone,
I’m looking for advice on secure, scalable, and seamless API authorization best practices across multiple cloud platforms.
Here’s the setup:
I have an API Gateway deployed in AWS, pro...
1
answers
0
votes
46
views
asked 8 days ago
My question is I'm having issues these particular place called key pair after creating it successful when I want to install it then it's will showing not installed and I have tried several times think...
1
answers
0
votes
34
views
asked 9 days ago
Good morning everyone;
I created a VPN with two subnets, a private one with an EC2 instance (protected by Security Group) and a public one with a NAT GTW and IGW. In the private subnet, in the NACL s...
2
answers
0
votes
85
views
asked 20 days ago
What is the best tool to identify resources an IAM role has access to but doesn't use/ need.
I attempted using Last accessed/ CloudTrail lake / Cloudtrail API
But none of these worked for various ...
1
answers
0
votes
54
views
asked 25 days ago
Two days ago we stopped receiving notifications from our Gravity Forms contact form on WordPress. We've confirmed with Gravity that the notifications are being handed over the mail server successfully...
1
answers
-1
votes
51
views
asked a month ago
Hi ,
UK has published https://www.ncsc.gov.uk/collection/cloud/the-cloud-security-principles
I want to understand how doe AWS comply to these principles.AWS offers lot of operational guidance on ho...
1
answers
-1
votes
86
views
asked a month ago
For ARM64 workloads in Nitro Enclaves, what are the recommended compiler flags?
Specifically:
1. Should we use -mcpu=neoverse-n1 (conservative) or -mcpu=neoverse-v1
(Graviton3-specific) or -mcpu=...
1
answers
0
votes
30
views
asked a month ago